首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   107238篇
  免费   1859篇
  国内免费   438篇
电工技术   1080篇
综合类   2352篇
化学工业   16844篇
金属工艺   5120篇
机械仪表   3480篇
建筑科学   3428篇
矿业工程   656篇
能源动力   1712篇
轻工业   5418篇
水利工程   1490篇
石油天然气   412篇
无线电   10958篇
一般工业技术   20537篇
冶金工业   7109篇
原子能技术   448篇
自动化技术   28491篇
  2023年   214篇
  2022年   359篇
  2021年   567篇
  2020年   340篇
  2019年   434篇
  2018年   14822篇
  2017年   13714篇
  2016年   10466篇
  2015年   1152篇
  2014年   962篇
  2013年   1598篇
  2012年   4248篇
  2011年   10767篇
  2010年   9257篇
  2009年   6478篇
  2008年   7811篇
  2007年   8753篇
  2006年   1049篇
  2005年   1948篇
  2004年   1854篇
  2003年   1803篇
  2002年   1086篇
  2001年   521篇
  2000年   536篇
  1999年   456篇
  1998年   801篇
  1997年   579篇
  1996年   482篇
  1995年   419篇
  1994年   388篇
  1993年   370篇
  1992年   280篇
  1991年   217篇
  1990年   268篇
  1989年   260篇
  1988年   224篇
  1987年   224篇
  1986年   226篇
  1985年   265篇
  1984年   224篇
  1983年   223篇
  1982年   207篇
  1981年   194篇
  1980年   168篇
  1979年   193篇
  1978年   164篇
  1977年   185篇
  1976年   234篇
  1975年   160篇
  1974年   123篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
In the present paper the problem of disturbance rejection of single input-single output neutral time delay systems with multiple measurable disturbances is solved via dynamic controllers. In particular, the general form of the controller matrices is presented, while the necessary and sufficient conditions for the controller to be realizable are offered. The proposed technique is applied to a test case neutral time delay central heating system. In particular, the nonlinear model of the plant and its linearized approximation are presented. Based on the linearized model, a two-stage controller is designed in order to regulate the room temperature and the boiler effluent temperature. The performance of the closed loop system is investigated through computational experiments.  相似文献   
972.
How to compose existing web services automatically and to guarantee the correctness of the design(e.g. freeness of deadlock and unspecified reception,and temporal constraints) is an important and challenging problem in web services. Most existing approaches require a detailed specification of the desired behaviors of a composite service beforehand and then perform certain formal verification to guarantee the correctness of the design,which makes the composition process both complex and time-consuming. In th...  相似文献   
973.
Adaptive rendering large and complex spatial data has become an important research issue in a 3DGIS application. In order to transmit the data to the client efficiently,this paper proposes a node-layer data model to manage the 3D scene. Because the large spatial data and limited network bandwidth are the main bottlenecks of web-based 3DGIS,a client/server architecture including progressive transmission methods and multiresolution representations,together with the spatial index,are developed to improve the p...  相似文献   
974.
975.
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy—perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Biline...  相似文献   
976.
Guiding Attention by Cooperative Cues   总被引:2,自引:1,他引:1       下载免费PDF全文
A common assumption in visual attention is based on the rationale of "limited capacity of information processing". From this view point there is little consideration of how different information channels or modules are cooperating because cells in processing stages are forced to compete for the limited resource. To examine the mechanism behind the cooperative behavior of information channels, a computational model of selective attention is implemented based on two hypotheses. Unlike the traditional view of visual attention, the cooperative behavior is assumed to be a dynamic integration process between the bottom-up and top-down information. Furthermore, top-down information is assumed to provide a contextual cue during selection process and to guide the attentional allocation among many bottom-up candidates. The result from a series of simulation with still and video images showed some interesting properties that could not be explained by the competitive aspect of selective attention alone.  相似文献   
977.
Logic programming under the stable model semantics is proposed as a non-monotonic language for knowledge representation and reasoning in artificial intelligence. In this paper, we explore and extend the notion of compatibility and the Λ operator, which were first proposed by Zhang to characterize default theories. First, we present a new characterization of stable models of a logic program and show that an extended notion of compatibility can characterize stable submodels. We further propose the notion of weak auto-compatibility which characterizes the Normal Forward Chaining Construction proposed by Marek, Nerode and Remmel. Previously, this construction was only known to construct the stable models of FC-normal logic programs, which turn out to be a proper subclass of weakly auto-compatible logic programs. We investigate the properties and complexity issues for weakly auto-compatible logic programs and compare them with some subclasses of logic programs.  相似文献   
978.
Although IP Multimedia Subsystem (IMS) based Next Generation Networks (NGNs) are already emerging as the common session control platform for converging fixed, mobile and cable networks, harmonized solutions for the management of these converged platforms have still got to be developed. This document describes a hands-on approach to NGN Management. Started with IMS specific management systems, succeeding research had to take into account the importance of the management of NGN SDPs as well. This work shows that the hybrid nature of an NGN, where services can be delivered at the IMS layer, by SIP signaling mechanisms, as well as at the SDP, via Web Services, requires a harmonized management approach. Taking into account Service Oriented Architecture (SOA) principles and policy based model driven architectures, this work shows that a unification of service composition and service management already at the workflow creation level, bares significant benefits in terms of automation and harmonization. Following the SOA paradigm, the approach presented here does not differentiate between business process management (BPM) and management process management. Focusing on Telemanagement Forum’s enhanced Telecom Operations Map service fulfillment and service assurance operations, this document describes an New Generation Software and Services (NGOSS) based implementation of a unified Operation Support System (OSS) for NGNs that encompasses many problems of former stovepipe management solutions in terms of automation, flexibility and manageability.  相似文献   
979.
In the past several years, various ontologies and terminologies such as the Gene Ontology have been developed to enable interoperability across multiple diverse medical information systems. They provide a standard way of representing terms and concepts thereby supporting easy transmission and interpretation of data for various applications. However, with their growing utilization, not only has the number of available ontologies increased considerably, but they are also becoming larger and more complex to manage. Toward this end, a growing body of work is emerging in the area of modular ontologies where the emphasis is on either extracting and managing "modules" of an ontology relevant to a particular application scenario (ontology decomposition) or developing them independently and integrating into a larger ontology (ontology composition). In this paper, we investigate state-of-the-art approaches in modular ontologies focusing on techniques that are based on rigorous logical formalisms as well as well-studied graph theories. We analyze and compare how such approaches can be leveraged in developing tools and applications in the biomedical domain. We conclude by highlighting some of the limitations of the modular ontology formalisms and put forward additional requirements to steer their future development.  相似文献   
980.
Mining of music data is one of the most important problems in multimedia data mining. In this paper, two research issues of mining music data, i.e., online mining of music query streams and change detection of music query streams, are discussed. First, we proposed an efficient online algorithm, FTP-stream (Frequent Temporal Pattern mining of streams), to mine all frequent melody structures over sliding windows of music melody sequence streams. An effective bit-sequence representation is used in the proposed algorithm to reduce the time and memory needed to slide the windows. An effective list structure is developed in the FTP-stream algorithm to overcome the performance bottleneck of 2-candidate generation. Experiments show that the proposed algorithm FTP-stream only needs a half of memory requirement of original melody sequence data, and just scans the music query stream once. After mining frequent melody structures, we developed a simple online algorithm, MQS-change (changes of Music Query Streams), to detect the changes of frequent melody structures in current user-centered music query streams. Two music melody structures (set of chord-sets and string of chord-sets) are maintained and four melody structure changes (positive burst, negative burst, increasing change and decreasing change) are monitored in a new summary data structure, MSC-list (a list of Music Structure Changes). Experiments show that the MQS-change algorithm is an effective online method to detect the changes of music melody structures over continuous music query streams.
Hua-Fu LiEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号